李伟祥 助理教授

  • 办公室:致信楼N801
  • 导师类别:博士生导师、硕士生导师
  • E-mail:liweixiang@szu.edu.cn
  • 办公电话:
个人详情

简介

李伟祥,工学博士,助理教授,特聘研究员,博士生导师/硕士生导师,深圳市优秀博士后,深圳市高层次引进特聘岗位人才(C类)。2016年获得西安电子科技大学信息安全工学学士学位,2021年获得中国科学技术大学网络空间安全工学博士学位。主要研究兴趣为信息隐藏、多媒体取证与安全,在国内外重要期刊和会议上发表学术论文近30篇(含IEEE Trans/CCF-A论文近20篇),获得ACM IH&MMSec最佳学生论文奖等国内外优秀学术论文奖5项。主持国家自然科学基金面上项目等国家及省部级项目4项,参与国家自然科学基金联合基金重点项目2项。担任中国图象图形学学会(CSIG)数字媒体取证与安全专委会委员,以及十余个IEEE Trans/CCF-A期刊与会议审稿人。指导学生获中国研究生网络安全创新大赛全国二等奖、全国信息隐藏及检测对抗竞赛图像组冠军。


联系方式

邮箱:liweixiang_AT_szu.edu.cn

地址:深圳大学沧海校区电子与信息工程学院致信楼N801


研究兴趣

信息隐藏、多媒体取证与安全


招生方向

信息与通信工程(学术型博士/硕士)、新一代电子信息技术(专业型硕士)


科研平台

广东省智能信息处理重点实验室、深圳市媒体信息内容安全重点实验室


主持/参与科研项目

·国家自然科学基金面上项目(625***28),2026.01-2029.12,主持.

·国家自然科学基金青年科学基金项目C类(622***10),2023.01-2025.12,主持

·中国博士后科学基金面上项目(2022M7***92),2022.11-2024.04,主持

·广东省自然科学基金面上项目(2025A15150***92),2025.01-2027.12,主持

·深圳市新引进高精尖缺人才科研启动项目,2026.01-2028.12,主持

·深圳大学青年教师科研启动项目,2024.05-2026.12,主持

·国家自然科学基金联合基金重点项目(U22B***7),2023.01-2026.12,参与

·国家自然科学基金联合基金重点项目(U23B***2),2024.01-2027.12,参与


获得奖励

·2025年:深圳大学电子与信息工程学院优秀共产党员、2025年度广东省计算机学会优秀论文奖二等奖(第一作者)

·2024年:2024年度广东网络空间安全优秀论文一等奖(通讯作者)、2024年深圳市第四届优秀科技学术论文奖(通讯作者)、隐者联盟2024年度杰出论文奖

·2023年:深圳市优秀博士后(全市50人)、全国信息隐藏及检测对抗竞赛CIHC2023图像赛道冠军(指导老师)

·2022年:中国研究生网络安全创新大赛全国二等奖(指导老师)

·2021年:中国科学技术大学“优秀毕业生”

·2020年:国家奖学金(博士研究生)、“王小谟网络空间科技英才”优秀学生奖学金

·2019年:中国互联网发展基金会网络安全奖学金

·2018年:国际信息隐藏及多媒体安全领域旗舰学术会议2018 ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec) 唯一“最佳学生论文奖”(第一作者)


代表性论文(带*为通讯作者)

[1]Weixiang Li, Bin Li*, Weiming Zhang and Shengli Zhang. Quaternary Quantized Gaussian Modulation with Optimal Polarity Map Selection for JPEG Steganography[J]. IEEE Transactions on Information Forensics and Security (TIFS), 2023, 18: 5026-5040.

[2]Weixiang Li, Shihang Wu, Bin Li*, Weixuan Tang and Xinpeng Zhang. Payload-Independent Direct Cost Learning for Image Steganography[J]. IEEE Transactions on Circuits and Systems for Video Technology (TCSVT), 2024, 34(3): 1970-1975.

[3]Weixiang Li, Weiminig Zhang*, Li Li, Hang Zhou and Nenghai Yu. Designing Near-Optimal Steganographic Codes in Practice Based on Polar Codes[J]. IEEE Transactions on Communications (TCOM), 2020, 68(7): 3948-3962.

[4]Weixiang Li, Wenbo Zhou, Weiming Zhang*, Chuan Qin, Huanhuan Hu and Nenghai Yu. Shortening the Cover for Fast JPEG Steganography[J]. IEEE Transactions on Circuits and Systems for Video Technology (TCSVT), 2020, 30(6): 1745-1757.

[5]Weixiang Li, Kejiang Chen, Weiming Zhang*, Hang Zhou, Yaofei Wang and Nenghai Yu. JPEG Steganography with Estimated Side-Information[J]. IEEE Transactions on Circuits and Systems for Video Technology (TCSVT), 2020, 30(7): 2288-2294.

[6]Weixiang Li, Weiming Zhang*, Kejiang Chen, Wenbo Zhou and Nenghai Yu. Defining Joint Distortion for JPEG Steganography[C]. Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec 2018), 2018: 5-16. (Best Student Paper Award)

[7]Weixiang Li, Bin Li*, Kengtao Zheng, Songze Li, and Haodong Li. Document Image Forgery Detection and Localization in Desensitization Scenarios[J]. Signal Processing, 2026, 238: 110123.

[8]Bin Li, Jincheng Chen, Yuxiong Xu, Weixiang Li* and Zhenghui Liu. DRAW: Dual-Decoder-Based Robust Audio Watermarking Against Desynchronization and Replay Attacks[J]. IEEE Transactions on Information Forensics and Security (TIFS), 2024, 19: 6529-6544.

[9]Bin Li, Jian Shi, Weixiang Li* and Haodong Li. WebP-JPEG Transcoding Detection by Spotting Re-compression Artifacts with CNN-ViT for Processing Dual-domain Features[J]. IEEE Transactions on Circuits and Systems for Video Technology (TCSVT), 2024, 34(12): 12535-12549.

[10]Xulong Liu, Weixiang Li*, Kaiqing Lin and Bin Li. Spatial-frequency Feature Fusion Network for Lightweight and Arbitrary-sized JPEG Steganalysis[J]. IEEE Signal Processing Letters (SPL), 2024, 31: 2585-2589.

[11]Kaiqing Lin, Bin Li*, Weixiang Li, Mauro Barni, Benedetta Tondi, and Xulong Liu. Constructing an Intrinsically Robust Steganalyzer via Learning Neighboring Feature Relationships and Self-Adversarial Adjustment[J]. IEEE Transactions on Information Forensics and Security (TIFS), 2024, 19: 9390-9405.

[12]Yaofei Wang, Weiming Zhang*, Weixiang Li, and Nenghai Yu. Non-Additive Cost Functions for JPEG Steganography Based on Block Boundary Maintenance[J]. IEEE Transactions on Information Forensics and Security (TIFS), 2021, 16: 1117-1130.

[13]Yaofei Wang, Weiming Zhang*, Weixiang Li, Xinzhi Yu, and Nenghai Yu. Non-Additive Cost Functions for Color Image Steganography Based on Inter-Channel Correlations and Differences[J]. IEEE Transactions on Information Forensics and Security (TIFS), 2020, 15: 2081-2095.

[14]Yaofei Wang, Weixiang Li, Weiming Zhang*, Xinzhi Yu, Kunlin Liu, and Nenghai Yu. BBC++: Enhanced Block Boundary Continuity on Defining Non-Additive Distortion for JPEG Steganography[J]. IEEE Transactions on Circuits and Systems for Video Technology (TCSVT), 2021, 31(5): 2082-2088.

[15]Kejiang Chen, Hang Zhou, Weixiang Li, Kuan Yang, Weiming Zhang*, and Nenghai Yu. Derivative-based Steganographic Distortion and Its Non-additive Extensions for Audio[J]. IEEE Transactions on Circuits and Systems for Video Technology (TCSVT), 2020, 30(7): 2027-2032.

[16]Jiansong Zhang, Kejiang Chen*, Weixiang Li, Weiming Zhang, and Nenghai Yu. Steganography With Generated Images: Leveraging Volatility to Enhance Security[J]. IEEE Transactions on Dependable and Secure Computing (TDSC), 2024, 21(4): 3994-4005.

[17]Hang Zhou, Kejiang Chen*, Weiming Zhang*, Weixiang Li, and Nenghai Yu. Three-Dimensional Mesh Steganography and Steganalysis: A Review[J]. IEEE Transactions on Visualization and Computer Graphics (TVCG), 2021, 28(12): 5006-5025.

[18]Kaiqing Lin, Yuzhen Lin, Weixiang Li, Taiping Yao, and Bin Li*. Standing on The Shoulders of Giants: Reprogramming Visual-language Model for General Deepfake Detection[C]. Proceedings of the AAAI Conference on Artificial Intelligence (AAAI), 2025, 39(5): 5262-5270.

[19]Yuxiong Xu, Bin Li*, Weixiang Li, Sara Mandelli, Viola Negroni, and Sheng Li. ALDEN: Dual-Level Disentanglement with Meta-learning for Generalizable Audio Deepfake Detection[C]. Proceedings of the 33rd ACM International Conference on Multimedia (ACM MM), 2025: 7277-7286.

[20]Kaiqing Lin, Zhiyuan Yan, Ke-Yue Zhang, Li Hao, Yue Zhou, Yuzhen Lin, Weixiang Li, Taiping Yao, Shouhong Ding, and Bin Li*. Guard Me If You Know Me: Protecting Specific Face-Identity from Deepfakes[C]. Advances in Neural Information Processing Systems (NeurIPS), 2025.


发明专利

[1]张卫明, 俞能海, 李伟祥, 李莉. 隐写编解码方法、装置及设备(ZL201910360912.2)

[2]李斌, 郑铿涛, 李伟祥. 基于对比学习的文档图像篡改定位和脱敏定位方法及终端(ZL202310970608.6)

[3]李伟祥, 陈金城, 王功华, 李斌. 基于嵌入强度预测网络的音频鲁棒水印生成方法及终端(CN202410937431.4)

[4]李伟祥, 李斌, 施简.一种解压后WebP图像量化参数估计方法、装置及终端(CN202511077831.3)

[5]李斌, 肖鑫甜, 李伟祥.一种面向WebP有损压缩图像的自适应隐写方法及系统(CN202511142790.1)

[6]李斌, 施简, 李伟祥. 一种融合高频空域和DCT域的有损压缩检测方法及终端(CN202310830562.8)

[7]李斌, 许裕雄, 李伟祥.一种音频深度伪造检测方法、装置、终端及存储介质(CN202511075784.9)